


default search action
46th Allerton Conference 2008: Monticello, IL, USA
- 46th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2008, Monticello, IL, USA, September 24-26, 2008. IEEE 2008, ISBN 978-1-4244-2925-7

- Rathinakumar Appuswamy, Massimo Franceschetti, Nikhil Karamchandani, Kenneth Zeger:

Network coding for computing. 1-6 - Ioannis Ch. Paschalidis, Keyong Li, Dong Guo:

Landmark-based position and movement detection of wireless sensor network devices. 7-14 - Brian M. Sadler

, Ning Liu, Zhengyuan Xu, Richard J. Kozick:
Range-based geolocation in fading environments. 15-20 - Guillaume Obozinski, Martin J. Wainwright

, Michael I. Jordan
:
Union support recovery in high-dimensional multivariate regression. 21-26 - Sameer Pawar, Amir Salman Avestimehr, David N. C. Tse:

Diversity-multiplexing tradeoff of the half-duplex relay channel. 27-33 - Yusuke Ohwatari, Anass Benjebbour, Junichiro Hagiwara, Tomoyuki Ohya:

Reduced-complexity transmit power optimization techniques for multiuser MIMO with per-antenna power constraint. 34-38 - Seung-Jun Kim, Georgios B. Giannakis

:
Optimal resource allocation for MIMO ad hoc cognitive radio networks. 39-45 - Nasreen Badruddin, Sibi Raj Bhaskaran, Jamie S. Evans

, Stephen V. Hanly
:
Maximizing the sum rate in symmetric networks of interfering links under flat power constraints. 46-53 - Changhun Bae, Wayne E. Stark:

Minimum energy-per-bit multi-hop wireless networks. 54-61 - Tianqi Wang, Wendi B. Heinzelman

, Alireza Seyedi:
Minimization of transceiver energy consumption in wireless sensor networks with AWGN channels. 62-66 - Alireza Seyedi, Biplab Sikdar

:
Modeling and analysis of energy harvesting nodes in wireless sensor networks. 67-71 - Ozgur Oyman, Moe Z. Win

:
Power-bandwidth tradeoff in multiuser relay channels with opportunistic scheduling. 72-78 - Ali Tajer, Xiaodong Wang:

Opportunistic multi-antenna downlink transmission with finite-rate feedback. 79-86 - Shahab Oveis Gharan, Alireza Bayesteh, Amir K. Khandani:

Diversity-multiplexing tradeoff in multiple-relay network-part I: Proposed scheme and single-antenna networks. 87-94 - Shahab Oveis Gharan, Alireza Bayesteh, Amir K. Khandani:

Diversity-multiplexing tradeoff in multiple-relay network-part II: Multiple-antenna networks. 95-102 - R. N. Krishnakumar, Naveen Naveen, K. Sreeram, P. Vijay Kumar:

Diversity multiplexing tradeoff of asynchronous cooperative relay networks. 103-110 - Zoran Utkovski

, Pi-Chin Chen, Juergen Lindner:
Some geometric methods for construction of space-time codes in Grassmann manifolds. 111-118 - Umer Salim, Dirk Slock:

Broadcast channel: Degrees of freedom with no CSIR. 119-125 - Benjamin M. Zaidel, Ralf R. Müller, Rodrigo de Miguel

, Aris L. Moustakas:
On replica symmetry breaking in vector precoding for the Gaussian MIMO broadcast channel. 126-132 - Michael D. Zoltowski, Tariq R. Qureshi, A. Robert Calderbank:

Complementary codes based channel estimation for MIMO-OFDM systems. 133-138 - Jieying Chen, Randall A. Berry

, Michael L. Honig:
An adaptive limited feedback scheme for MIMO-OFDMA based on optimal stopping. 139-145 - Chih-Chun Wang:

A coded-feedback construction of locally minimum-cost multicast network codes. 146-153 - Sukwon Kim, Tracey Ho, Michelle Effros:

Network coding with periodic recomputation for minimum energy multicasting in mobile ad-hoc networks. 154-161 - Ahmed E. Kamal, Osameh M. Al-Kofahi

:
Toward an optimal 1+N protection strategy. 162-169 - Niveditha Sundaram, Parameswaran Ramanathan:

M-Perf: An available bandwidth estimation tool for multicast applications. 170-176 - Abhay T. Subramanian, Andrew Thangaraj

:
A simple algebraic formulation for the scalar linear network coding problem. 177-184 - Sormeh Shadbakht, Babak Hassibi:

Cayley's hyperdeterminant, the principal minors of a symmetric matrix and the entropy region of 4 Gaussian random variables. 185-190 - Martin J. Wainwright

:
Spectral clustering in high-dimensions: Necessary and sufficient conditions for dense and sparse mixtures. 191 - Sanjoy Dasgupta, Yoav Freund:

Random projection trees for vector quantization. 192-197 - Radu Berinde, Piotr Indyk, Milan Ruzic:

Practical near-optimal sparse recovery in the L1 norm. 198-205 - Andrew McGregor:

Recent results on processing random-order streams and space-efficient sampling. 206-208 - Yi Lu, Andrea Montanari, Balaji Prabhakar:

Counter Braids: Asymptotic optimality of the message passing decoding algorithm. 209-216 - Sirin Nitinawarat, Chunxuan Ye, Alexander Barg, Prakash Narayan, Alex Reznik:

Common Randomness, Multiuser Secrecy and Tree Packing. 217-220 - David Tse, Roy D. Yates, Zang Li:

Fading broadcast channels with state information at the receivers. 221-227 - Oren Somekh, Osvaldo Simeone

, H. Vincent Poor, Shlomo Shamai
:
The two-tap input-earasure Gaussian channel and its application to cellular communications. 228-235 - Kristen Ann Woyach, Anant Sahai, George K. Atia, Venkatesh Saligrama

:
Crime and Punishment for Cognitive Radios. 236-243 - Sonja Buchegger, Tansu Alpcan

:
Security games for vehicular networks. 244-251 - Reiko Ann Miura-Ko, Benjamin Yolken, Nicholas Bambos, John Mitchell:

Security investment games of interdependent organizations. 252-260 - George Theodorakopoulos

, John S. Baras, Jean-Yves Le Boudec:
Dynamic network security deployment under partial information. 261-267 - Lifeng Lai, Siu-Wai Ho

, H. Vincent Poor:
Privacy-security tradeoffs in biometric security systems. 268-273 - Muthanna Al-Mahmoud, Michael D. Zoltowski:

Performance evaluation of code-spread OFDM. 274-278 - Mark F. Flanagan

:
Linear-programming receivers. 279-285 - Maxim Raginsky:

On the information capacity of Gaussian channels under small peak power constraints. 286-293 - Dimitris S. Papailiopoulos, George N. Karystinos:

Efficient maximum-likelihood noncoherent orthogonal STBC detection. 294-300 - Amin Aminzadeh Gohari

, Venkat Anantharam:
An outer bound to the admissible source region of broadcast channels with arbitrarily correlated sources and channel variations. 301-308 - Jun Zhang, Jeffrey G. Andrews, Robert W. Heath Jr.

:
Single-user MIMO vs. Multiuser MIMO in the broadcast channel with CSIT constraints. 309-314 - Mohammad Ali Khojastepour, Alireza Keshavarz-Haddad

:
On capacity of deterministic relay networks. 315-318 - Hakan Topakkaya, Zhengdao Wang:

Effects of delay and links between relays on the min-cut capacity in a wireless relay network. 319-323 - Sukwon Kim, Michelle Effros, Tracey Ho:

Distributed design of network codes for wireless multiple unicasts. 324-331 - Randy Cogill, Brooke Shrader, Anthony Ephremides:

Random linear coding for multicast over a time-varying channel. 332-338 - Elona Erez, Michelle Effros, Tracey Ho:

Network codes with deadlines. 339-346 - Parikshit Shah, Pablo A. Parrilo

:
A partial order approach to decentralized control of spatially invariant systems. 347-352 - Ilan Lobel, Asuman E. Ozdaglar:

Convergence analysis of distributed subgradient methods over random networks. 353-360 - Usman A. Khan, Soummya Kar

, Bruno Sinopoli, José M. F. Moura:
Distributed sensor localization in Euclidean spaces: Dynamic environments. 361-366 - Deniz Üstebay, Boris N. Oreshkin, Mark Coates, Michael G. Rabbat:

Rates of convergence for greedy gossip with eavesdropping. 367-374 - Vinod Sharma, Utpal Mukherji, Vinay Joseph

:
Efficient energy management policies for networks with energy harvesting sensor nodes. 375-383 - Sujay Sanghavi, Dmitry Malioutov, Alan S. Willsky:

Networking sensors using belief propagation. 384-391 - Eitan Yaakobi, Alexander Vardy

, Paul H. Siegel, Jack K. Wolf:
Multidimensional flash codes. 392-399 - Alexander Barg, Arya Mazumdar, Gilles Zémor

:
Weight distribution of codes on hypergraphs. 400-401 - Mohammad H. Taghavi, Amin Shokrollahi, Paul H. Siegel:

Efficient implementation of linear programming decoding. 402-409 - Dinkar Vasudevan:

Achievable flows on orthogonal information networks. 410-417 - Vijay G. Subramanian

, Douglas J. Leith
:
On a class of optimal rateless codes. 418-425 - Alon Shalev Housfater, Teng Joon Lim

:
On asymptotics of Tomlinson-Harashima precoding with channel uncertainty. 426-431 - Ali Vakili, Babak Hassibi:

A Stieltjes transform approach for analyzing the RLS adaptive Filter. 432-437 - Julie R. Vale, Daniel E. Miller:

Tracking in the presence of a time-varying uncertain gain. 438-445 - Sachin Adlakha, Sanjay Lall

, Andrea Goldsmith:
A Bayesian network approach to control of networked Markov decision processes. 446-451 - Dzung Du, Wisuwat Bhosri, Arthur E. Frazho:

Mixed norm low order multirate filterbank design: Relaxed commutant lifting approach. 452-459 - Urs Niesen, Piyush Gupta, Devavrat Shah:

The capacity region of large wireless networks. 460-466 - Soheil Mohajer, Suhas N. Diggavi, Christina Fragouli, David Tse:

Transmission techniques for relay-interference networks. 467-474 - Kery Hardwick, Dennis Goeckel, Don Towsley

:
Modeling distributed beamforming in wireless networks. 475-482 - Changhee Joo

, Ness B. Shroff:
On the delay performance of in-network aggregation in lossy wireless sensor networks. 483-490 - Parijat Dube, Rahul Jain

:
N-player Bertrand-Cournot games in queues: Existence of equilibrium. 491-498 - Ana Radovanovic, Cliff Stein:

Asymptotic performance of the non-forced idle time scheduling policies in the presence of variable demand for resources. 499-503 - Francisco J. Piera, Ravi R. Mazumdar

:
An ergodic result for queue length processes of state-dependent queueing networks in the heavy-traffic diffusion limit. 504-507 - Krishna Jagannathan

, Eytan H. Modiano, Lizhong Zheng:
Effective resource allocation in a queue: How much control is necessary? 508-515 - Chad C. Lau, Michael D. Zoltowski:

Reduced dimension equalizer and interference canceller for MIMO-OFDM. 516-522 - Ivana Maric, Nan Liu, Andrea Goldsmith:

Encoding against an interferer's codebook. 523-530 - Sriram Sridharan, Amin Jafarian, Sriram Vishwanath, Syed Ali Jafar

, Shlomo Shamai
:
A layered lattice coding scheme for a class of three user Gaussian interference channels. 531-538 - Changxin Shi, Randall A. Berry

, Michael L. Honig:
Distributed interference pricing with MISO channels. 539-546 - Nan Liu, Deniz Gündüz

, Andrea J. Goldsmith, H. Vincent Poor:
Interference channels with correlated receiver side information. 547-554 - Ali Rahimi, Benjamin Recht:

Uniform approximation of functions with random bases. 555-561 - Weiyu Xu, Babak Hassibi:

Compressed sensing over the Grassmann manifold: A unified analytical framework. 562-567 - Robert Nowak:

Generalized binary search. 568-574 - Waheed U. Bajwa, Akbar M. Sayeed, Robert Nowak:

Learning sparse doubly-selective channels. 575-582 - Rahul Tandra, Anant Sahai:

Overcoming SNR walls through macroscale features. 583-590 - Bobak Nazer, Alexandros G. Dimakis, Michael Gastpar:

Local interference can accelerate gossip algorithms. 591-598 - Roberto Ambrosino

, Bruno Sinopoli, Kameshwar Poolla, Shankar Sastry:
Optimal sensor density for remote estimation over Wireless Sensor Networks. 599-606 - Subhrakanti Dey

, Alex S. Leong, Jamie S. Evans
:
On Kalman filtering with faded measurements. 607-614 - John Musacchio, Shuang Wu:

The price of anarchy in competing differentiated services networks. 615-622 - Stacy Patterson, Bassam Bamieh

:
Distributed consensus with link failures as a structured stochastic uncertainty problem. 623-627 - Danny Bickson, Ori Shental, Danny Dolev:

Distributed Kalman filter via Gaussian Belief Propagation. 628-635 - Christian G. Claudel

, Alexandre M. Bayen:
Guaranteed bounds for traffic flow parameters estimation using mixed Lagrangian-Eulerian sensing. 636-645 - John MacLaren Walsh, Steven Weber:

Capacity region of the permutation channel. 646-652 - Samar Agnihotri, H. S. Jamadagni:

Worst-case asymmetric distributed source coding. 653-660 - Jin Meng, En-Hui Yang, Da-ke He:

Low-density linear IED schemes for lossless source coding with decoder only side information. 661-668 - Soummya Kar

, José M. F. Moura, Kavita Ramanan:
Large deviations for many server networks with long range dependent and batch arrivals. 669-674 - Chan Zhou, Gerhard Wunder:

General stability conditions in wireless broadcast channels. 675-682 - Michael J. Neely:

Delay analysis for max weight opportunistic scheduling in wireless systems. 683-691 - Parv Venkitasubramaniam

, Anant Sahai:
Incentivizing anonymous "peer-to-peer" reviews. 692-699 - Xiaohu Shang, Biao Chen, Gerhard Kramer

, H. Vincent Poor:
On the capacity of MIMO interference channels. 700-707 - Erik G. Larsson, Danyo Danev

, Eduard A. Jorswieck
:
Asymptotically optimal transmit strategies for the multiple antenna interference channel. 708-714 - I-Hsiang Wang, David N. C. Tse:

Gaussian interference channels with multiple receive antennas: Capacity and generalized degrees of freedom. 715-722 - Lalitha Sankar, Xiaohu Shang, Elza Erkip

, H. Vincent Poor:
Ergodic two-user interference channels: Is separability optimal? 723-729 - Giuseppe Caire, Sean A. Ramprashad, Haralabos C. Papadopoulos, Christine Pépin, Carl-Erik W. Sundberg:

Multiuser MIMO downlink with limited inter-cell cooperation: Approximate interference alignment in time, frequency and space. 730-737 - Wooseok Nam, Sae-Young Chung:

Relay networks with orthogonal components. 738-745 - Jae Won Yoo, Tie Liu, Feng Xue:

Broadcasting with receiver message side information: A deterministic approach. 746-752 - Etienne Perron, Suhas N. Diggavi, Emre Telatar:

Wireless network secrecy with public feedback. 753-760 - Jubin Jose, Alexei Ashikhmin, Phil Whiting, Sriram Vishwanath:

Precoding methods for multi-user TDD MIMO systems. 761-767 - Peter Marbach, Atilla Eryilmaz:

A backlog-based CSMA mechanism to achieve fairness and throughput-optimality in multihop wireless networks. 768-775 - Bilal Sadiq, Gustavo de Veciana:

Optimality and large deviations of queues under the pseudo-Log rule opportunistic scheduling. 776-783 - Matthew Andrews, Brooke Shrader:

Medium access control for multicast traffic in ad-hoc networks. 784-790 - Jun Luo, Dongning Guo:

Neighbor discovery in wireless ad hoc networks based on group testing. 791-797 - Radu Berinde, Anna C. Gilbert, Piotr Indyk, Howard J. Karloff, Martin J. Strauss:

Combining geometry and combinatorics: A unified approach to sparse signal recovery. 798-805 - Emmanuel J. Candès, Benjamin Recht:

Exact low-rank matrix completion via convex optimization. 806-812 - Yaron Rachlin, Dror Baron

:
The secrecy of compressed sensing measurements. 813-817 - Matthieu R. Bloch, J. Nicholas Laneman:

On the secrecy capacity of arbitrary wiretap channels. 818-825 - Tiangao Gou, Syed Ali Jafar

:
On the secure degrees of freedom of wireless X networks. 826-833 - Ghadamali Bagherikaram, Abolfazl S. Motahari, Amir K. Khandani:

Secure broadcasting : The secrecy rate region. 834-841 - Mohammad Shahmohammadi, Hesham El Gamal:

Tree search for digital fingerprinting. 842-849 - Tanya Ignatenko, Frans M. J. Willems:

Privacy leakage in biometric secrecy systems. 850-857 - Ramachandran Rajesh

, Vinod Sharma:
Transmission of correlated sources over a fading multiple access channel. 858-864 - Osvaldo Simeone

, Deniz Gündüz
, H. Vincent Poor, Andrea Goldsmith, Shlomo Shamai
:
Compound multiple access channels with conferencing decoders. 865-872 - Fadi Abi Abdallah, Raymond Knopp, Giuseppe Caire:

Transmission of correlated sources over Gaussian multiple-access channels with phase shifts. 873-878 - Rui Zhang

, Shuguang Cui
, Ying-Chang Liang
:
On ergodic sum capacity of fading cognitive multiple-access channel. 879-886 - Ashutosh Sabharwal, Debashis Dash, Suhas N. Diggavi:

Compound Gaussian multiple access channels with noisy feedback. 887-894 - Danny Bickson, Yoav Tock, Ori Shental, Danny Dolev:

Polynomial Linear Programming with Gaussian belief propagation. 895-901 - Rajesh T. Krishnamachari, Mahesh K. Varanasi:

Volume of geodesic balls in the complex Stiefel manifold. 902-909 - Elette C. Boyle, Robert J. McEliece:

Asymptotic weight enumerators of randomly punctured, expurgated, and shortened code ensembles. 910-917 - Nicholas Ruozzi, Sekhar Tatikonda:

s-t paths using the min-sum algorithm. 918-921 - Mark F. Flanagan

, Enrico Paolini, Marco Chiani
, Marc P. C. Fossorier:
On the growth rate of the weight distribution of irregular doubly-generalized LDPC codes. 922-929 - L. Jonathan Kluberg, Georgia Perakis:

Generalized quantity competition for multiple products and loss of efficiency. 930-936 - Esteban Arcaute, Ramesh Johari, Shie Mannor

:
Local dynamics for network formation games. 937-938 - Lin Xu, Ross Baldick:

Stability of supply function equilibrium in electricity markets under piecewise linear function perturbations. 939-944 - Steven Jaslar, Sekhar Tatikonda:

Convergence of optimal values past critical threshold. 945-951 - Minghong Lin, John C. S. Lui, Dah-Ming Chiu:

Design and analysis of ISP-friendly file distribution protocols. 952-959 - Yongzhi Wang, Tom Z. J. Fu, Dah Ming Chiu:

Analysis of load balancing algorithms in P2P streaming. 960-967 - Shao Liu, Mung Chiang, Sudipta Sengupta, Jin Li, Philip A. Chou:

P2P streaming capacity for heterogeneous users with degree bounds. 968-976 - Daniel N. Liu, Michael P. Fitz:

Turbo MIMO equalization and decoding in fast fading mobile coded OFDM. 977-982 - Yuxing Han, Jiangtao Wen, John D. Villasenor:

Entropy coding using equiprobable partitioning. 983-990 - Ali Talari, Nazanin Rahnavard:

A low-latency and error-resilient Video-on-Demand broadcasting protocol using UEP-rateless codes. 991-995 - Jing Hu, Jerry D. Gibson:

New rate distortion bounds for natural videos based on a texture dependent correlation model in the spatial-temporal domain. 996-1003 - Behrouz Maham

, Are Hjørungnes:
Opportunistic relaying through amplify-and-forward distributed space-time codes with partial statistical CSI at relays. 1004-1008 - Marco Zoffoli, Jerry D. Gibson, Marco Chiani

:
Source information transmission over MIMO systems with transmitter side information. 1009-1013 - Ersen Ekrem, Sennur Ulukus:

On the secrecy of multiple access wiretap channel. 1014-1021 - Sungho Yun, Constantine Caramanis

:
System level optimization in wireless networks with uncertain customer arrival rates. 1022-1029 - Osvaldo Simeone

, Oren Somekh, Gerhard Kramer
, H. Vincent Poor, Shlomo Shamai
:
Uplink sum-rate analysis of a multicell system with feedback. 1030-1036 - Changho Suh

, David Tse:
Interference Alignment for Cellular Networks. 1037-1044 - Ron Dabora, Andrea Goldsmith:

Large on the capacity of indecomposable finite-state channels with feedback. 1045-1052 - Demijan Klinc, Jeongseok Ha, Steven W. McLaughlin:

Optimized puncturing and shortening distributions for nonbinary LDPC codes over the binary erasure channel. 1053-1058 - Jing Lei, Wen Gao:

Matching graph connectivity of LDPC codes to high-order modulation by bit interleaving. 1059-1064 - Amir Bennatan, A. Robert Calderbank, Shlomo Shamai

:
Bounds on the MMSE of "bad" LDPC codes at rates above capacity. 1065-1072 - Marcos B. S. Tavares, Michael Lentmaier, Gerhard P. Fettweis, Kamil Sh. Zigangirov:

Asymptotic distance and convergence analysis of braided protograph convolutional codes. 1073-1080 - Rong Pan, Balaji Prabhakar, Flavio Bonomi, Bob Olsen:

Approximate fair bandwidth allocation: A method for simple and flexible traffic management. 1081-1085 - Galina Schwartz, Nikhil Shetty, Jean C. Walrand:

Network neutrality: Avoiding the extremes. 1086-1093 - Richard T. B. Ma

, John C. S. Lui, Dah-Ming Chiu, Vishal Misra, Dan Rubenstein:
The shapley value: Its use and implications on internet economics. 1094-1096 - Vivek S. Borkar, D. J. Das, Abhijit Datta Banik

, D. Manjunath:
A learning scheme for stationary probabilities of large markov chains with examples. 1097-1099 - Yuhong Guo, Dale Schuurmans:

Efficient global optimization for exponential family PCA and low-rank matrix factorization. 1100-1107 - Zhaohui Zheng, Hongyuan Zha, Gordon Sun:

Query-level learning to rank using isotonic regression. 1108-1115 - Huizhen Yu, Dimitri P. Bertsekas:

New error bounds for approximations from projected linear equations. 1116-1123 - Hamidou Tembine

, Eitan Altman, Rachid El Azouzi, Yezekael Hayel:
Stable networking games. 1124-1131 - Lun Dong, Zhu Han, Athina P. Petropulu, H. Vincent Poor:

Secure wireless communications via cooperation. 1132-1138 - Georg Bocherer, Alexandre de Baynast, Rudolf Mathar:

Cooperative protocols for random access networks. 1139-1145 - Mingyan Liu

, Yunnan Wu:
Spectum sharing as congestion games. 1146-1153 - Alireza Aram, Saswati Sarkar, Chandramani Kishore Singh, Anurag Kumar

:
A coalitional game framework for cooperative secondary spectrum access. 1154-1160 - Ramanan Subramanian, Faramarz Fekri

:
Unicast throughput analysis of finite-buffer sparse mobile networks using Markov chains. 1161-1168 - Zheng Wang, Hamid R. Sadjadpour, J. J. Garcia-Luna-Aceves:

Capacity scaling laws of information dissemination modalities in wireless ad hoc networks. 1169-1176 - Mohammad Nekoui, Hossein Pishro-Nik:

A geometrical analysis of Vehicular Ad-Hoc Networks for safety applications. 1177-1183 - Chengzhi Li, Huaiyu Dai, Husheng Li:

Finding the K largest metrics in a noisy broadcast network. 1184-1190 - Saverio Bolognani

, Simone Del Favero
, Luca Schenato
, Damiano Varagnolo
:
Distributed sensor calibration and least-square parameter identification in WSNs using consensus algorithms. 1191-1198 - Xiang He, Aylin Yener:

Providing secrecy with lattice codes. 1199-1206 - Oliver Kosut, Lang Tong:

A characterization of the error exponent for the Byzantine CEO problem. 1207-1214 - Reihaneh Safavi-Naini, Shaoquan Jiang:

Unconditionally secure conference key distribution: Security definitions and their relations. 1215-1220 - Patrick Tague

, Radha Poovendran
:
Modeling node capture attacks in wireless sensor networks. 1221-1224 - Frédérique E. Oggier, Hanane Fathi:

Multi-receiver authentication code for network coding. 1225-1231 - Narayana Santhanam, Martin J. Wainwright

:
Sample complexity of determining structures of graphical models. 1232-1237 - Shashi Kiran Chilappagari, Dung Viet Nguyen, Bane Vasic, Michael W. Marcellin:

Girth of the Tanner graph and error correction capability of LDPC codes. 1238-1245 - Danilo Silva

, Frank R. Kschischang
:
Adversarial error correction for network coding: Models and metrics. 1246-1253 - Christine A. Kelley:

On codes designed via algebraic lifts of graphs. 1254-1261 - Devavrat Shah, Damon Wischik:

Lower bound and optimality in switched networks. 1262-1269 - Mohammad Alizadeh, Berk Atikoglu, Abdul Kabbani, Ashvin Lakshmikantha, Rong Pan, Balaji Prabhakar, Mick Seaman:

Data center transport mechanisms: Congestion control theory and IEEE standardization. 1270-1277 - Adam Wierman, Lachlan L. H. Andrew, Ao Tang:

Stochastic analysis of power-aware scheduling. 1278-1283 - Adam Kirsch, Michael Mitzenmacher:

On the performance of multiple choice hash tables with moves on deletes and inserts. 1284-1290 - Huan Xu, Constantine Caramanis

, Shie Mannor
:
Robust dimensionality reduction for high-dimension data. 1291-1298 - Huan Xu, Shie Mannor

, Constantine Caramanis
:
Sparse algorithms are not stable: A no-free-lunch theorem. 1299-1303 - Sachin Adlakha, Ramesh Johari, Gabriel Y. Weintraub, Andrea Goldsmith:

Oblivious equilibrium for stochastic games with concave utility. 1304-1308 - Seyed Saeed Changiz Rezaei, Shahab Oveis Gharan, Amir K. Khandani:

Cooperative strategies for the half-duplex Gaussian parallel relay channel: Simultaneous relaying versus successive relaying. 1309-1316 - Lawrence Ong

, Wei Wang, Mehul Motani
:
Achievable rates and optimal schedules for half duplex multiple-relay networks. 1317-1324 - Srinath Puducheri, Thomas E. Fuja:

Capacity results for certain wireless relay networks with erasure links. 1325-1332 - Deniz Gündüz

, Ertem Tuncel
, Jayanth Nayak:
Rate regions for the separated two-way relay channel. 1333-1340 - Srinath Puducheri, Thomas E. Fuja:

Trading off coding complexity and feedback requirements for the packet erasure channel. 1341-1346 - Hong Wan, Rong-Rong Chen:

Beamforming codebook design for temporally correlated fading channels. 1347-1353 - Hossein Najafi, Mohammad Erfan Danesh Jafari, Mohamed Oussama Damen:

Adaptive soft-output detection in MIMO systems. 1354-1358 - Petros Elia

, Joakim Jaldén
:
Construction criteria and existence results for approximately universal linear space-time codes with reduced decoding complexity. 1359-1364 - Raghunandan H. Keshavan, Andrea Montanari, Sewoong Oh:

Learning low rank matrices from O(n) entries. 1365-1372 - Parv Venkitasubramaniam

, Venkat Anantharam:
Anonymity under light traffic conditions using a network of mixes. 1373-1380 - Justin Dauwels, François B. Vialatte

, Theophane Weber, Andrzej Cichocki
:
Analyzing brain signals by combinatorial optimization. 1381-1388 - Hilary K. Finucane, Zhenming Liu, Michael Mitzenmacher:

Designing floating codes for expected performance. 1389-1396 - Jennifer Price, Tara Javidi:

A game-theoretic approach to coding for information networks. 1397-1402 - Adi Akavia, Ramarathnam Venkatesan:

Perturbation codes. 1403-1409 - Jörg Kliewer, Kamil Sh. Zigangirov, Daniel J. Costello Jr.:

On the minimum trapping distance of repeat accumulate accumulate codes. 1410-1415 - Pascal O. Vontobel

:
Symbolwise graph-cover decoding: Connecting sum-product algorithm decoding and bethe free energy minimization. 1416 - Yingbin Liang, Gerhard Kramer

, H. Vincent Poor:
Equivalence of two inner bounds on the capacity region of the broadcast channel. 1417-1421 - Bobak Nazer, Michael Gastpar:

The case for structured random codes: Beyond linear models. 1422-1425 - Wei Kang, Sennur Ulukus:

Capacity of a class of diamond channels. 1426-1431 - P. S. Chandrashekhar Thejaswi, Amir Bennatan, Junshan Zhang, A. Robert Calderbank, Douglas Cochran:

Rate-achievability strategies for two-hop interference flows. 1432-1439 - Aditya Mahajan

, Ashutosh Nayyar, Demosthenis Teneketzis:
Identifying tractable decentralized control problems on the basis of information structure. 1440-1449 - Michael Rotkowitz, Randy Cogill:

Convex synthesis of distributed controllers for spatio-temporal systems with subadditive support functions. 1450-1456 - Sundaram Vanka, Vijay Gupta

, Martin Haenggi
:
Power-delay analysis of consensus algorithms on wireless networks with interference. 1457-1464 - Serdar Yüksel:

Stochastic nestedness and information analysis of tractability in decentralized control. 1465-1472 - Giacomo Como

, Fabio Fagnani, Sandro Zampieri
:
Anytime reliable transmission of real-valued information through digital noisy channels. 1473-1480 - Husheng Li, Huaiyu Dai:

Continuous-model communication complexity with application in distributed resource allocation in wireless Ad hoc networks. 1481-1486 - G. Matthew Ezovski, Animashree Anandkumar, Ao Kevin Tang, Lachlan L. H. Andrew:

Min-min times in peer-to-peer file sharing networks. 1487-1494 - Somsak Kittipiyakul

, Tara Javidi, Vijay G. Subramanian
:
Many-sources large deviations for max-weight scheduling. 1495-1502 - Anna Pantelidou

, Anthony Ephremides:
A cross-layer view of wireless multicast optimization. 1503-1510 - Libin Jiang, Jean C. Walrand:

A distributed CSMA algorithm for throughput and utility maximization in wireless networks. 1511-1519 - Sugumar Murugesan, Philip Schniter

, Ness B. Shroff:
Multiuser scheduling in a Markov-modeled downlink environment. 1520-1526 - Wei-Hsin Gu, Michelle Effros, Mayank Bakshi

:
A continuity theory for lossless source coding over networks. 1527-1534 - Toby Berger:

Multiterminal rate-distortion theory revisited. 1535-1537 - Dinesh Krithivasan, S. Sandeep Pradhan:

Distributed source coding using Abelian group codes: Extracting performance from structure. 1538-1545 - Aaron B. Wagner:

On distributed compression of linear functions. 1546-1553 - Yuval Kochman, Ram Zamir:

The joint gaussian CEO/MAC problem and relaying. 1554-1561 - Ravi Tandon, Sennur Ulukus:

A new upper bound on the capacity of a class of primitive relay channels. 1562-1569 - Satish Vedantam, Wenyi Zhang, Urbashi Mitra:

Joint communication and channel estimation: the two hop case. 1570-1577 - Massimo Franceschetti, Marco Donald Migliore

, Paolo Minero:
The degrees of freedom of wireless networks: information-theoretic and physical limits. 1578-1581 - Amir Salman Avestimehr, Aydin Sezgin

, David N. C. Tse:
Approximate capacity of the two-way relay channel: A deterministic approach. 1582-1589

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














